Certified Ethical Hacker Course



Similar documents
CURSO DE HACKING ETICO. En este curso el participante comprenderá la metodología del etical hacking y penetration testing.

Certified Ethical Hacker (CEH)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Ethical Hacking v7 40 H.

Certified Ethical Hacker Exam Version Comparison. Version Comparison

ETHICAL HACKING. By REAL TIME FACULTY

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Ethical Hacking Course Layout

CYBERTRON NETWORK SOLUTIONS

EC Council Security Analyst (ECSA)

SONDRA SCHNEIDER JOHN NUNES

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Detailed Description about course module wise:

CEH Version8 Course Outline


Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Build Your Own Security Lab

Vulnerability Assessment and Penetration Testing

CRYPTUS DIPLOMA IN IT SECURITY

Certified Penetration Testing Specialist

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

Penetration Testing with Kali Linux

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Security and Firewall 1

CS5008: Internet Computing

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

INFORMATION SECURITY TRAINING

[CEH]: Ethical Hacking and Countermeasures

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Demystifying Penetration Testing

Linux Network Security

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

EC Council Certified Ethical Hacker V8

Topics in Network Security

Networking: EC Council Network Security Administrator NSA

Certified Cyber Security Expert V Web Application Development

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Securing Cisco Network Devices (SND)

Certified Penetration Testing Specialist

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

Security: Attack and Defense

SCP - Strategic Infrastructure Security

Description: Objective: Attending students will learn:

Chapter 8 Phase3: Gaining Access Using Network Attacks

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

CERTIFIED PENETRATION TESTING CONSULTANT

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

NSSA Faculty Involvement in IT Security Auditing at RIT

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Network Attacks and Defenses

Certified Penetration Testing Engineer

WEB APPLICATION HACKING. Part 2: Tools of the Trade (and how to use them)

Web App Security Audit Services

Certified Penetration Testing Specialist (CPTS) with CEH Backtrack

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Network Security: Introduction

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Certified Ethical Hacker v.6 Training (12-Month Online Access, Single-User + EC-Council Books & DVD)

RMAR Technologies Pvt. Ltd.

Learn Ethical Hacking, Become a Pentester

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

Israel Aladejebi Computer Forensics Century College Information Technology Department

General Network Security

FSP-201: Ethical Hacking & IT Security

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Network Security Fundamentals

Security Considerations White Paper for Cisco Smart Storage 1

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

ANTI-HACKER TOOL KIT. ourth Edition

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis

Open Source Security Tools

information security and its Describe what drives the need for information security.

Network Forensics: Log Analysis

Course Content: Session 1. Ethics & Hacking

A43. Modern Hacking Techniques and IP Security. By Shawn Mullen. Las Vegas, NV IBM TRAINING. IBM Corporation 2006

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Transcription:

Certified Ethical Hacker Course Descripción del curso CEH (Certified Ethical Hacker) es la certificación oficial de hacking ético desde una perspectiva independiente de fabricantes. El Hacker Ético es la persona que lleva a cabo intentos de intrusión en redes y/o sistemas utilizando los mismos métodos que un Hacker. La diferencia más importante es que el Hacker Ético tiene autorización para realizar las pruebas sobre los sistemas que ataca. El objetivo de esta certificación es adquirir conocimientos prácticos sobre los sistemas actuales de seguridad para convertirse en un profesional del hacking ético. Este curso llevará al estudiante a un entorno interactivo, donde se les mostrará como explorar, probar, hackear y asegurar sus propios sistemas. El entorno intensivo del laboratorio da a cada estudiante un profundo conocimiento y experiencia práctica con los actuales sistemas esenciales de seguridad. Los estudiantes empezarán por entender como funcionan las defensas periféricas y posteriormente serán llevados a explorar y atacar sus propias redes; (ninguna red real es dañada). Los estudiantes aprenden como los intrusos escalan privilegios y que pasos se pueden tomar para asegurar un sistema. También aprenderán sobre la Detección de Intrusos, Creación de Políticas de seguridad, Ingeniería Social, Ataques DDoS, Hacking en Aplicaciones Web, seguridad en redes inalámbricas, Desbordamientos de Memoria, Creación de Virus y muchos otros módulos más. Este curso lo prepara para el examen 312-50 de EC-Council para la certificación de Ethical Hacker Quién Debería Asistir Este curso beneficiará ampliamente a oficiales de seguridad de la información, auditores de seguridad, profesionales de la seguridad, Técnicos en seguridad, administradores de red y de sistemas, y a quienes deseen orientar su carrera profesional hacia el campo de la seguridad de los sistemas de información. Duración 56 horas - 14 días de 4 hrs. diarias Acuerdo Legal La misión del curso de Ethical Hacking and Countermesures es educar, presentar y demostrar las herramientas de hackeo, únicamente para propósitos de pruebas de penetración. Antes de asistir a este curso, se le pedirá que firme un acuerdo donde declara que no utilizará las habilidades recién adquiridas, para ataques ilegales o maliciosos, que no usará dichas herramientas en un intento de comprometer algún sistema computacional; y que indemnizará a Ethical Hacking Consultores, con respecto al uso o mal uso de estas herramientas, sin importar la intención. No cualquiera puede ser estudiante Ethical Hacking Consultores, se asegurarán de que los aspirantes trabajen para compañías legítimas.

Costo del Curso El curso completo tiene un costo de 200 $us (Dólares Americanos) Material a entregar Al momento de la inscripción el alumno recibirá el siguiente material: 1 Block de notas CEH Original 1 Lapicera 1 CD CEH-1 - Contiene Todo el material de lectura de la certificación y exámenes de prueba 1 CD CEH-2 - Contiene todas las herramientas de la certificación mostradas en este temario 1 CD CEH-3 - Contiene videos divididos por módulos sobre el uso de las herramientas CEH-2 1 CD CEH-4 - Live CD exclusivo para pruebas de penetración usado en los Laboratorios 1 CD CEH-5 - Live CD con sistemas operativos vulnerables para pruebas de laboratorio Certificación Al finalizar el curso de preparación para el examen 312-50 de EC-Council, el cursante será evaluado con un examen Off-line mediante un software de certificación CEH. De acuerdo a su puntaje obtenido en este examen el cursante recibirá uno de estos certificados. Certificado de Aprobación ( con el 75 % aprobado) Certificado de Asistencia ( menor al 75 % aprobado) Aclaración: El certificado de aprobación entregado por Ethical Hacking Consultores solamente certifica que el cursante esta apto para tomar el examen 312-50 de EC-Council en cualquier centro Prometric o VUE de su ciudad, en ningún caso pretende remplazar al certificado CEH entregado por CE- Council. Información Para mayor información puede contactarnos en los siguientes correos: admin@ehacking.com.bo ethical.hacking.bo@gmail.com

Módulo 1: Ethics and Legality Why Security? The Security, functionality and ease of use Triangle Can Hacking be Ethical? Essential Terminology. Elements of Security. What does a Malicious Hacker do? Difference between Penetration Testing and Ethical Hacking. Hacker Classes. What do Ethical Hackers do? Skill Profile of an Ethical Hacker. Modes of Ethical Hacking. Security Testing. Deliverables. Computer Crimes and Implications. Legal Perspective (US Federal Laws). Módulo 2: Footprinting Defining Footprinting. Information Gathering Methodology. Locate the Network Range. : Whois Nslookup ARIN Traceroute NeoTrace VisualRoute Trace SmartWhois Visual Lookout VisualRoute Mail Tracker emailtrackerpro Módulo 3: Scanning Definition of Scanning. Types of scanning Objectives of Scanning Scanning Methodology Classification of Scanning Nmap XMAS Scan FIN Scan Null Scan Windows Scan Idle Scan Nessus Retina Saint HPing2 Firewalk NIKTO GFI Languard ISS Security Scanner Netcraft IPsec Scan NetScan Tools pro 2003 Super Scan Floppyscan War Dialer THC Scan Friendly Pinger Cheops Security Administrator s Tool for Analyzing Network (SATAN) SAFEsuite Internet Scanner IdentTCPScan PortScan Plus Strobe Blaster Scan OS Fingerprinting Active Stack fingerprinting Tool for Active Stack fingerprinting XPROBE2 Passive Fingerprinting Proxy Servers Socks Chain Anonymizers HTTP Tunnel HTTPort Módulo 4: Enumeration What is Enumeration? NetBios Null Sessions DumpSec Winfo NetBIOS Auditing Tool (NAT) Null Session NetBIOS Enumeration Hacking Tool :NBTScan Simple Network Management Protocol (SNMP) Enumeration Solarwinds Enum SNScan SNMP Enumeration Management Information Base (MIB) Windows 2000 DNS Zone Transfer

Blocking Win 2k DNS Zone Transfer Enumerating User Accounts User2sid and Sid2user UserInfo GetAcct DumpReg Trout Winfingerprint PsTools PSFile PSLoggedOn PSGetSid PSInfo PSService PSList PSKill PSSuspend PSLogList PSExec PSShutdown Active Directory Enumeration and Módulo 5: System Hacking Administrator Password Guessing Manual Password Cracking Algorithm Automated Password Cracking Password Types Types of Password Attacks Hacking Tool NTInfoScan (CIS) Performing Automated Password Guessing Hacking Tool Legion Password Sniffing LOphtcrack pwdump2 and pwdump3 KerbCrack NBTdeputy NetBIOS DoS Attack NBName John the Ripper LAN Manager Hash Password Cracking Syskey Utility Cracking NT/2000 Passwords Hacking Tool NTFSDOS SMB Logon Hacking Tool: SMBRelay SMBRelay Man-in-the-Middle Scenario Hacking Tool : SMBRelay2 SMBRelay Weaknesses and SMBGrind SMBDie Privilege Escalation GetAdmin hk.exe Keystroke Loggers IKS Software Keylogger Ghost Keylogger Hardware Key Logger Spyware Spector eblaster Hiding Files Creating Alternate Data Streams ADS creation and detection Makestream ads_cat Streams LADS (List Alternate Data Streams) NTFS Streams Stealing Files Using Word Documents Field Code Steganography Spyware Tool - Desktop Spy Steganography tools DiSi-Steganograph EZStego Gif-It-Up v1.0 Gifshuffle Hide and Seek JPEG-JSTEG MandelSteg and GIFExtract Mp3Stego Nicetext Pretty Good Envelope OutGuess SecurEngine Stealth Snow Steganography Tools 4 Steganos Steghide Stegodos Stegonosaurus StegonoWav wbstego Image Hide

MP3Stego StegonoWav Snow.exe Camera/Shy Steganography Detection Hacking Tool diskprobe.exe overing Tracks Disabling Auditing and clearing Event Logs Hacking Tool Dump Event Log elsave.exe WinZapper Evidence Eliminator RootKit Planting the NT/2000 RootKit Fu Vanquish Rootkit Hacking Tool Patchfinder 2.0 Módulo 6: Trojans and Backdoors Effect on Business What is a Trojan? Overt and Covert Channels Working of Trojans Different Types of Trojans What Trojan Creators look for? Different ways a Trojan can get into a system Indications of a Trojan Attack Some famous Trojans and ports used by them How to determine which ports are Listening? Different Trojans found in the Wild Beast 2.06 Phatbot Senna Spy CyberSpy Remote Encrypted Callback UNIX Backdoor (RECUB) Amitis QAZ Back Orifice Back Orifice 2000 Tini NetBus SubSeven Netcat Subroot Let me Rule 2.0 Beta 9 Donald Dick Graffiti.exe EliteWrap IconPlus Restorator Whack-a-mole Firekiller 2000 BoSniffer Wrappers Packaging Tool : Wordpad Hard Disk Killer (HDKP 4.0) ICMP Tunneling Hacking Tool: Loki Loki Reverse WWW Shell Covert Channels using HTTP fport TCP View Tripwire Process Viewer Inzider-Tracks Processes and Ports System File Verification Trojan horse Construction Kit Anti-Trojan Evading Anti-Trojan/Anti-Virus using Stealth Tools v 2.0 Reverse Engineering Trojans Backdoor Módulo 7: Sniffers Definition of sniffing How a Sniffer works? Passive Sniffing Active Sniffing Hacking Tool: EtherFlood Man-in-the-Midle Attacks Spoofing and Sniffing Attacks ARP Poisoning and countermeasures Ethereal Dsniff Sniffit Aldebaran Hunt NGSSniff Ntop pf IPTraf Etherape Netfilter Network Probe

Maa Tec Network Analyzer Snort Macof, MailSnarf, URLSnarf, WebSpy Windump Etherpeek Ettercap SMAC Mac Changer Iris NetIntercept WinDNSSpoof NetIntercept Win DNSpoof TCPDump Network Monitor Gobbler ETHLOAD Esniff Sunsniff Linux_sniffer Sniffer Pro Sniffing Módulo 8: Denial of Service What is Denial of Service? Goal of DoS(Denial of Service) Impact and Modes of Attack DoS Attack Classification Smurf Buffer Overflow Attacks Ping Of death Teardrop SYN Tribal Flow Attack Jolt2 Bubonic.c Land and LaTierra Targa Distributed DOS Attacks and Characteristics Agent Handler Model IRC-Based DDoS Attack Model DDoS Attack taxonomy DDoS Tools Trin00 Tribe Flow Network (TFN) TFN2K Stacheldraht Shaft Trinity Knight Mstream Kaiten Reflected DOS Attacks Reflection of the Exploit for Reflected DoS Tools for Detecting DDOS Attacks ipgrep tcpdstat findoffer DDoS Defensive Tool: Zombie Zapper Worms: Slammer and MyDoom.B Módulo 9: Social Engineering What is Social Engineering? Art of Manipulation Human Weakness Common Types of Social Engineering Human Based Impersonation Example of social engineering Computer Based Social Engineering Reverse Social Engineering Policies and procedures Security Policies-checklist Módulo 10: Session Hijacking Understanding Session Hijacking Spoofing vs Hijacking Steps in Session Hijacking Types of Session Hijacking TCP Concepts 3 Way Handshake Sequence numbers Juggernaut T-Sight TTY Watcher IP Watcher Hunt Paros v3.1.1 TTY-Watcher IP Watcher T-sight Remote TCP Session Reset Utility Dangers Posed by Session Hijacking Protection against Session Hijacking : IP Security Módulo 11: Hacking Web Servers How Web Servers Work? How are Web Servers Compromised? Popular Web Servers and Common Security Threats Apache Vulnerability

Attack against IIS IIS Components Sample Buffer Overflow Vulnerabilities Hacking Tool: IISHack.exe ISAPI.DLL Exploit Code Red and ISAPI.DLL Exploit Unicode Unicode Directory Traversal Vulnerability Unicodeuploader.pl IISxploit.exe execiis-win32.exe Msw 3prt IPP Vulnerability Hacking Tool: Jill.c IPP Buffer Overflow Unspecified Executed Path Vulnerability File System Traversal WebDAV/ ntdll.dll Vulnerability Real World instance of WebDAV Exploit Hacking Tool: KaHT RPCDCOM Vulnerability ASN Exploits IIS Logs Network Tool: Log Analyzer Hacking Tool: Clean IISLog Escalating Privileges on IIS hk.exe cmdasp.asp iiscrack.dll ispc.exe Microsoft IIS 5.0-5.1 remote denial of service Exploit Tool Microsoft Frontpage Server Extensions fp30reg.dll Exploit Tool GDI+ JPEG Remote Exploit Tool Windows Task Scheduler Exploit Tool Microsoft Windows POSIX Subsystem Local Privilege Escalation Exploit Tool Hot Fixes and Patches Solution: UpdateEXPERT cacls.exe Utility Vulnerability Scanners Network Tools Whisker N-Stealth Webinspect Shadow Security Scanner Increasing Web Server Security Módulo 12: Web Application Vulnerabilities Web Application Set-up Web Application Hacking Anatomy of an Attack Web Application Threats Cross Site Scripting/XSS Flaws An Example of XSS SQL Injection Command Injection Flaws Cookie/Session Poisoning Parameter/Form Tampering Buffer Overflow Directory Traversal/Forceful Browsing Cryptographic Interception Authentication Hijacking Log Tampering Error Message Interception Attack Obfuscation Platform Exploits Internet Explorer Exploits DMZ Protocol Attacks DMZ Security Management Exploits Web Services Attacks Zero Day Attacks Network Access Attacks TCP Fragmentation : Instant Source Wget WebSleuth Black Widow Window Bomb Burp: Positioning Payloads Burp: Configuring Payloads and Content Enumeration Burp Burp Proxy: Intercepting HTTP/S Traffic Burp Proxy: Hex-editing of Intercepted Traffic Burp Proxy: Browser Access to Request History Hacking Tool: curl Carnivore Google Hacking

Módulo 13: Web Based Password Cracking Techniques Authentication- Definition Authentication Mechanisms HTTP Authentication Basic Authentication Digest Authentication Integrated Windows (NTLM) Authentication Negotiate Authentication Certificate-based Authentication Forms-based Authentication Microsoft Passport Authentication What is a Password Cracker? Modus Operandi of an Attacker using Password Cracker How does a Password Cracker work? Attacks- Classification Password Guessing Query String Cookies Dictionary Maker Password Crackers Available LOphtcrack John The Ripper Brutus Obiwan Authforce Hydra Cain and Abel RAR Gammaprog : WebCracker Munga Bunga PassList Read Cookies SnadBoy WinSSLMiM Mary had a Little Lamb Formula Módulo 14: SQL Injection Attacking SQL Servers SQL Server Resolution Service (SSRS) Osql-L Probing Port Scanning Sniffing, Brute Forcing and finding Application Configuration Files Tools for SQL Server Penetration Testing SQLDict SqlExec SQLbf SQLSmack SQL2.exe AppDetective Database Scanner SQLPoke NGSSQLCrack NGSSQuirreL SQLPing v2.2 OLE DB Errors Input Validation Attack Login Guessing & Insertion Shutting Down SQL Server Extended Stored Procedures SQL Server Talks Preventive Measures Módulo 15: Hacking Wireless Networks Introduction to Wireless Networking Business and Wireless Attacks Wireless Basics Components of Wireless Network Types of Wireless Network Setting up WLAN Detecting a Wireless Network How to access a WLAN Advantages and Disadvantages of Wireless Network Antennas SSIDs Access Point Positioning Rogue Access Points Tools to Generate Rogue Access Points Fake AP NetStumbler MiniStumbler What is Wireless Equivalent Privacy (WEP)? WEP Tool: AirSnort WEPCrack Related Technology and Carrier Networks MAC Sniffing and AP Spoofing Tool to detect MAC Address Spoofing: Wellenreiter v2 Terminology Denial of Service Attacks DoS Attack Tool: FATAjack Man-in-the-Middle Attack (MITM) Scanning Tools: Redfang Kismet THC- WarDrive v2.1 PrismStumbler

MacStumbler Mognet v1.16 WaveStumbler StumbVerter v1.5 NetChaser v1.0 for Palm tops AP Scanner Wavemon Wireless Security Auditor (WSA) AirTraf 1.0 Wifi Finder Sniffing Tools: AiroPeek NAI Sniffer Wireless Ethereal Aerosol v0.65 vxsniffer EtherPEG Drifnet AirMagnet WinDump 3.8 Alpha ssidsniff Multi Use Tool: THC-RUT Tool: WinPcap Auditing Tool: bsd-airtools WIDZ- Wireless Detection Intrusion System Securing Wireless Networks Out of the box Security Radius: Used as Additional layer in security Maximum Security: Add VPN to Wireless LAN Módulo 16: Virus and Worms Virus Characteristics Symptoms of virus-like attack What is a Virus Hoax? Terminologies How is a worm different from virus? Indications of a Virus Attack Virus History Virus damage Effect of Virus on Business Access Methods of a Virus Mode of Virus Infection Life Cycle of a virus What Virus Infect? How virus infect? Virus/worm found in the wild: W32.CIH.Spacefiller (a.k.a Chernobyl) Win32/Explore.Zip Virus I Love You Virus Melissa Virus Pretty Park Code red Worm W32/Klez Bug Bear SirCam Worm Nimda SQL Slammer Writing a simple virus program. Writing DDOS Zombie Virus Virus Construction Kits Virus Creation Scripts Virus Detection Methods Virus Incident Response What is Sheep Dip? Prevention is better than Cure Anti-Virus Software Popular Anti-Virus packages New Virus found in 2004 Virus Checkers Blaster Virus Analysis Nimda Virus Analysis Sasser Worm Virus Analysis Klez Virus Analysis IDAPro Virus Analyzers Módulo 17: Physical Security Security statistics Physical Security breach incidents Understanding Physical Security What is the need of Physical Security? Who is Accountable for Physical Security? Factors affecting Physical Security Physical Security checklist Company surroundings Premises Reception Server Workstation Area Wireless Access Points Other Equipments such as fax, removable media etc Access Control Computer Equipment Maintenance Wiretapping Remote access Lock Picking Techniques Spying Technologies Módulo 18: Linux Hacking Why Linux? Linux basics

Chrooting Why is Linux Hacked? Linux Vulnerabilities in 2003 How to apply patches to vulnerable programs Scanning Networks Scanning Tool: Nessus Cheops Port Scan detection tools: Klaxon Scanlogd PortSentry LIDS (Linux Intrusion Detection System) Password cracking in Linux. Password cracking tools: John the Ripper Viper Slurpie IPChains IPTables ipchains vs. ipfwadm How to Organize Firewall Rules Security Auditor s Research Assistant (SARA) Hacking Tool: Sniffit HPing2 Hunt TCP Wrappers Linux Loadable Kernel Modules Linux Rootkits: Knark Torn Tuxit Adore Ramen Beast Rootkit countermeasures: Chkrootki Tripwire Bastille Linux LIDS(Linux Intrusion Detection system) Dtk Rkdet Rootkit Hunter Carbonite Rscan Saint Jude Linux Security Tools: Whisker Flawfinder Advanced Intrusion Detection System (AIDE) Linux Security testing tools NMap LSOF Netcat Nemesis Linux Encryption Tools: Stunnel OpenSSH/SSH SSH GnuPG Linux tools: Log and traffic monitors: MRTG Swatch Timbersee Logsurf IPLog IPTraf Ntop Linux Security Auditing Tool (LSAT) Linux Security countermeasures Módulo 19: Evading Firewalls, IDS and Honeypots Intrusion Detection Systems Ways to Detect Intrusion Types of Intrusion Detection System Intrusion Detection Tools Snort 2.1.0 Symantec ManHunt LogIDS 1.0 SnoopNetCop Standard Prelude Hybrid IDS version 0.8.x Samhain Steps to perform after an IDS detects an intrusion Evading IDS systems Tools to Evade IDS SideStep ADMutate Mendax v.0.7.1 Stick Fragrouter Anzen NIDSbench Packet Generators Introduction to Firewalls Firewall Identification Firewalking Banner Grabbing Breaching Firewalls Placing Backdoors through Firewalls Hiding Behind Covert Channel: Loki ACK tunneling Tools to Breach Firewall 007 Shell ICMP Shell

AckCmd Covert TCP1.0 Tools for testing IDS and Firewalls Introduction to Honeypots Honeypot Project Types of Honeypots Honeypot: Specter Honeypot: Honeyd Honeypot: KFSensor Hacking Tool: Sebek Tools to Detect Honeypot Send-Safe Honeypot Hunter Nessus Security Scanner Módulo 20: Buffer Overflows Significance of Buffer Overflow Vulnerability Why are Programs/Applications Vulnerable? Buffer Overflows Reasons for Buffer Overflow Attacks Knowledge required writing Buffer Overflow Exploits How a Buffer Overflow occurs? Understanding Stacks Stack Implementation Stack based buffer overflow Shellcode Heap Based buffer overflow How to detect Buffer Overflows in a Program? Attacking a real program NOPS How to mutate a Buffer Overflow Exploit? featuring ADMutate Return Address Defender (RAD) StackGuard Immunix System Vulnerability Search - ICAT Módulo 21: Cryptography Public-key Cryptography Working of Encryption Digital Signature Digital Certificate RSA (Rivest Shamir Adleman) RSA Attacks Brute forcing RSA factoring Esoteric attack Chosen cipher text attack Low encryption exponent attack Error analysis Other attacks MD5 SHA (Secure Hash Algorithm) SSL (Secure Socket Layer) RC5 What is SSH? Government Access to Keys (GAK) RSA Challenge distributed.net PGP (Pretty Good Privacy) Code Breaking Methodologies Using Brute Force Frequency Analysis Trickery and Deceit One-Time Pad Cryptography Attacks Disk Encryption PGPCrack Magic Lantern WEPCrack Cracking S/MIME Encryption using idle CPU Time CypherCalc Command Line Scriptor CryptoHeaven Módulo 22: Penetration Testing Need for a Methodology Penetration Test vs. Vulnerability Test Reliance on Checklists and Templates Phases of Penetration Testing Passive Reconnaissance Best Practices Results that can be expected Indicative passive reconnaissance steps include (but are not limited to) Introduction to Penetration Testing Type of Penetration Testing Methodologies Open Source Vs Proprietary Methodologies Security Assessment Vs Security Auditing Risk Analysis Types of Penetration Testing Types Ethical Hacking Vulnerability Assessment Vs Penetration Testing Do-it Yourself Testing Firms Offering Penetration Testing Services Penetration Testing Insurance Explication of Terms of Engagement Pen-Test Service Level Agreements

Offer of Compensation Starting Point and Ending Points of Testing Penetration Testing Locations Black Box Testing White Box Testing Grey Box Testing Manual Penetration Testing Automated Penetration Testing Selecting the Right Tools Pen Test Using Appscan HackerShield Pen-Test Using Cerberus Internet Scanner Pen-Test Using CyberCop Scanner Pen-Test Using Foundscan Pen-Test Using Nessus Pen-Test Using NetRecon Pen-Test Using Retina Pen-Test Using SAINT Pen-Test Using SecureNET Pen-Test Using SecureScan Pen-Test Using SATAN, SARA and Security Analyzer Pen-Test Using STAT Analyzer Pen-Test Using Twwscan VigilEnt WebInspect Evaluating Different Types of Pen-Test Tools Platform on Which Tools Will be Used Asset Audit Fault Tree and Attack Trees GAP Analysis Device Inventory Perimeter Firewall Inventory Web Server Inventory Load Balancer Inventory Local Area Network Inventory Demilitarized Zone Firewall Internal Switch Network Sniffer Application Server Inventory Database Server Inventory Name Controller and Domain Name Server Physical Security ISP Routers Legitimate Network Traffic Threat Unauthorized Network Traffic Threat Unauthorized Running Process Threat Loss of Confidential Information Business Impact of Threat Pre-testing Dependencies Post-testing Dependencies Failure Management Test Documentation Processes Penetration Testing Tools Defect Tracking Tools Configuration Management Tools Disk Replication Tools Pen-Test Project Scheduling Tools Network Auditing Tools DNS Zone Transfer Testing Tools Trace Route Tools and Services Network Sniffing Tools Denial of Service Emulation Tools Traditional Load Testing Tools System Software Assessment Tools Operating System Protection Tools Fingerprinting Tools Port Scanning Tools Directory and File Access Control Tools File Share Scanning Tools Password Directories Password Guessing Tools Link Checking Tools Web site Crawlers Web-Testing based Scripting Tools Buffer Overflow Protection Tools Buffer Overflow Generation Tools Input Data Validation Tools File encryption Tools Database Assessment Tools Keyboard Logging and Screen Reordering Tools System Event Logging and Reviewing Tools Tripwire and Checksum Tools Mobile-Code Scanning Tools Centralized Security Monitoring Tools Web Log Analysis Tools Forensic Data and Collection Tools Security Assessment Tools Multiple OS Management Tools SANS Institute TOP 20 Security Vulnerabilities All Operating System Platforms Default installs of operating systems and applications Accounts with no passwords or weak passwords Nonexistent or incomplete backups Large number of open ports Not filtering packets for correct incoming and outgoing addresses Nonexistent or incomplete logging Vulnerable Common Gateway Interface (CGI) programs Windows-specific Unicode vulnerability-web server folder traversal

Internet server application programming interface (ISAPI) extension buffer overflows IIS Remote Data Services (RDS) exploit Network Basic Input Output System (NetBIOS), unprotected Windows networking shares Information leakage via null session connections Weak hashing in SAM (Security Accounts Manager)-LanManager hash UNIX-specific Buffer overflows in Remote Procedure Call (RPC) services Sendmail vulnerabilities Bind weaknesses Remote system command (such as rcp, rlogin, and rsh) vulnerabilities Line Printer Daemons (LPD) vulnerabilities Sadmind and mountd exploits Default Simple Network Management Protocol (SNMP) strings Penetration Testing Deliverable Templates Test Status Report Identifier Test Variances Test Comprehensive Assessment Summary of Results (Incidents) Test Evaluation Names of Persons (Approval) Template Test Incident Report Template Test Log Active Reconnaissance Attack Phase Activity: Perimeter Testing Activity: Web Application Testing I Activity: Web Application Testing II Activity: Wireless Testing Activity: Acquiring Target Activity: Escalating Privileges Activity: Execute, Implant & Retract Post Attack Phase & Activities Automated Penetration Testing Tool - CORE Impact